
Bridging Your Gaps – Part 2: Social Engineering and Browser Security
In our previous segment (Bridging Your Gaps – Part 1), we covered network segmentation and egress filtering. Now let’s focus on some of the gaps that can directly lead to access to your sensitive data. Social Engineering and Browser Security The attackers in the Lockheed Martin breach of 2011, leveraged social engineering along with stolen… Read more »